pack14.25

Torrent Hash:
4D0D13CC0A3EF46B6A1CCCFA0D2A92B56E13DD9B
Number of Files:
96
Content Size:
3.27GB
Convert On:
2022-05-07
Keywords:
Magnet Link:
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
File Name
Size
VTC - Advanced Ethical Hacking (2013).zip
797.44MB
Vulnerability Exploit & website Hacking for Dummies.pdf
4.02MB
Insider Attack and Cyber Security: Beyond the Hacker.pdf
2.47MB
Cyber Operations: Building, Defending and Attacking Modern Computer Networks.pdf
21.33MB
How to Attack and Defend Your Website.pdf
23.46MB
Seven Deadliest Wireless Technologies Attacks.pdf
1.72MB
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations.pdf
3.73MB
Social Engineering Penetration Testing.pdf
15.12MB
Hacker Highschool: Lesson 7 Attack Analysis.pdf
322.94KB
Seven Deadliest Microsoft Attacks.pdf
2.17MB
Wireless Reconnaissance in Penetration Testing.pdf
9.74MB
Conducting Network Penetration and Espionage in a Global Environment.pdf
20.46MB
Beginner's Guide to Brute Force & DDoS Attacks.pdf
282.71KB
Hacker Attack.pdf
6.08MB
Seven Deadliest Unified Communications Attacks.pdf
5.74MB
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation.epub
28.54MB
Mastering Wireless Penetration Testing for Highly-Secured Environments - Aaron Johns.pdf
12.29MB
Buffer Overflow Attacks - Detect, Exploit, Prevent.pdf
5.39MB
Theoretical and Experimental Methods for Defending Against DDoS Attacks.pdf
5.1MB
Ultimate Guide to Social Enginnering attacks.pdf
136.38KB
50 Reasons For Mastering Penetration Testing.azw3
171.23KB
Penetration Testing: A Survival Guide Learning Path.pdf
52.87MB
Metasploit Extreme on Kali Linux.zip
484.05MB
Cisco Press - Penetration Testing and Network Defense.pdf
12.72MB
Mobile Device Exploitation Cookbook: Over 40 recipes to master mobile device penetration testing with open source tools.pdf
9.36MB
Wireless Network Penetration Testing Advanced Techniques.zip
91.91MB
SQL Injection attacks and tutorials by Exploit DB.pdf
327.69KB
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers, and Security Engineers.pdf
21.1MB
SQL Injection: Attacks and Defense.pdf
6.55MB
Preventing Digital Extortion: Mitigate ransomware, DDoS, and other cyber-extortion attacks.pdf
21.8MB
Seven Deadliest USB Attacks.pdf
5.18MB
Learning Nessus for Penetration Testing.pdf
4.38MB
Software Test Attacks to Break Mobile and Embedded Devices.pdf
19.91MB
WiFi hacking article.pdf
455.76KB
Python Penetration Testing Essentials.pdf
3.23MB
Digital Forensics and Incident Response: An intelligent way to respond to attacks.azw3
13.66MB
Hack Attacks Testing: How To Conduct Your Own Security Audit.pdf
9.56MB
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast.pdf
5.54MB
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research.pdf
4.9MB
Penetration Testing with the Bash Shell.pdf
25.19MB
Smart Grids Security and Privacy Issues.epub
1.96MB
Securing SQL Server: Protecting Your Database from Attackers 3rd Edition.pdf
9.71MB
RasPi: Attack of the PI Microrobots - Make a Voice Activated AI - Plus Build pyramids in Minecraft January 2018.pdf
8.99MB
Client-Side Attacks and Defense.pdf
15.02MB
Internet Advanced Denial of Service (DDOS) Attack.chm
2.06MB
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware.pdf
5.52MB
Penetration Tester's Open Source Toolkit 3rd Edition.pdf
16.99MB
Penetration Testing with Perl.pdf
4.35MB
Coding for Penetration Testers: Building Better Tools 2nd Edition.epub
9.13MB
Unified Communications Forensics: Anatomy of Common UC Attacks.pdf
32.39MB
Security, Collaboration, and Wireless Network Design for CCDA DESGN (200-310).zip
135.78MB
Cyber-Physical Attacks: A Growing Invisible Threat.pdf
6.65MB
Professional Java for Web Applications: Featuring WebSockets, Spring Framework, JPA Hibernate, and Spring Security.pdf
41.41MB
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide.pdf
7.68MB
Python Web Penetration Testing Cookbook.pdf
1.76MB
Web Hacking: Attacks and Defense.chm
6.32MB
Website Hacking In Practice Tutorial.zip
360.13MB
Metasploit: The Penetration Tester's Guide.pdf
6.93MB
The Official CHFI Exam 312-49 Study Guide for Computer Hacking Forensics Investigators.pdf
7.54MB
SQL Injection Attack and Defense - Sagar Joshi.pdf
401.8KB
Intelligent Mechanisms for Network Configuration and Security.pdf
4.63MB
Mobile Malware Attacks and Defense.pdf
9.93MB
Future Data and Security Engineering.pdf
32.72MB
Web Hacking & Penetration testing.pdf
9.26MB
Coding for Penetration Testers: Building Better Tools.pdf
9.88MB
Practical Lock Picking: A Physical Penetration Tester's Training Guide.pdf
7.9MB
Metasploit Penetration Testing Cookbook 2nd Edition.pdf
6.89MB
VMware vSphere Security Cookbook: Over 75 practical recipes to help you successfully secure your vSphere environment.pdf
22.24MB
Secure your Node.js Web Application: Keep Attackers Out and Users Happy.pdf
6.31MB
BackTrack 5 Cookbook: Over 80 recipes to execute many of the best known and little known penetration testing aspects of BackTrack 5.pdf
31.96MB
Penetration Testing With Backtrack 5.pdf
386.78KB
Seven Deadliest Web Application Attacks.pdf
2.82MB
Hack I.T.: Security Through Penetration Testing.pdf
12.27MB
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VB.pdf
11.16MB
Service Provider CCIE Advanced Technologies Class ISP Security and Common Attacks.pdf
129.83KB
Nmap Secrets Training Course.zip
569.54MB
CCNA Security Study Guide Exam 640-553.pdf
19.47MB
Cyber Attack Survival Manual: Tools for Surviving Everything from Identity heft to the Digital Apocalypse.azw3
6.45MB
Financial Cryptography and Data Security 2017.pdf
20.19MB
Predicting Security Threats with Splunk: Getting to Know Splunk.epub
244.85KB
Seven Deadliest Network Attacks.pdf
6.97MB
Hack Attacks Revealed.pdf
8.07MB
A Hacker in A Hacker World: Penetrating any kinds of security.azw3
5.57MB
A Practical Guide to TPM 2.0: Using the New Trusted Platform Module in the New Age of Security.pdf
5.09MB
Wireless Hacking: Projects for Wi-Fi Enthusiasts.pdf
18.31MB
Seven Deadliest Social Network Attacks.pdf
5.35MB
Spring Security 3.1.pdf
6.34MB
White Hat Hacking complete guide to XSS Attacks .pdf
884.7KB
Underground Tales of Hacking: Madness and Obsession on the Electronic Frontier.epub
1.08MB
Penetration Testing with BackBox.pdf
3.53MB
XSS Attacks Cross Site Scripting Exploits and Defense.pdf
7.34MB
hacking tutorials.zip
1.54MB
SILENCE ON THE WIRE A Field Guide to Passive Reconnaissance and Indirect Attacks.pdf
5.86MB
Keys to the Kingdom: Impressioning, Bumping, Master Escalation, and Other Key-Based Attacks Against Physical Locks.pdf
27.12MB
Managing Risk and Information Security: Protect to Enable 2nd Edition.pdf
11.34MB
Implementing Cisco IOS Network Security IINS CCNA Security Exam 640-553 Authorized Self-Study Guide.pdf
10.87MB

Latest Search:

W3siaWQiOiJhZHN0X2JfTV8zMDB4NTAiLCJhZHNwb3QiOiJiX01fMzAweDUwIiwid2VpZ2h0IjoiNSIsImZjYXAiOmZhbHNlLCJzY2hlZHVsZSI6ZmFsc2UsIm1heFdpZHRoIjoiNzY4IiwibWluV2lkdGgiOmZhbHNlLCJ0aW1lem9uZSI6ZmFsc2UsImV4Y2x1ZGUiOmZhbHNlLCJkb21haW4iOmZhbHNlLCJjb2RlIjoiPHNjcmlwdCB0eXBlPVwidGV4dFwvamF2YXNjcmlwdFwiPlxyXG4gIGF0T3B0aW9ucyA9IHtcclxuICAgICdrZXknIDogJzdkMWNjMGUxYjk4MWM5NzY4ZGI3ODUxZmM1MzVhMTllJyxcclxuICAgICdmb3JtYXQnIDogJ2lmcmFtZScsXHJcbiAgICAnaGVpZ2h0JyA6IDUwLFxyXG4gICAgJ3dpZHRoJyA6IDMyMCxcclxuICAgICdwYXJhbXMnIDoge31cclxuICB9O1xyXG4gIGRvY3VtZW50LndyaXRlKCc8c2NyJyArICdpcHQgdHlwZT1cInRleHRcL2phdmFzY3JpcHRcIiBzcmM9XCJodHRwJyArIChsb2NhdGlvbi5wcm90b2NvbCA9PT0gJ2h0dHBzOicgPyAncycgOiAnJykgKyAnOlwvXC93d3cuYm5odG1sLmNvbVwvaW52b2tlLmpzXCI+PFwvc2NyJyArICdpcHQ+Jyk7XHJcbjxcL3NjcmlwdD4ifV0=
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